메뉴 건너뛰기




Volumn 7880, Issue , 2011, Pages

Design of adaptive steganographic schemes for digital images

Author keywords

minimal distortion embedding; Steganography; steganography design

Indexed keywords

ADDITIVE DISTORTION; BLIND STEGANALYSIS; COST MODELS; DCT DOMAIN; DETECTABILITY; DIGITAL IMAGE; DIGITAL MEDIA; DISTORTION FUNCTIONS; EMBEDDING METHOD; FEATURE SETS; FEATURE SPACE; MINIMAL-DISTORTION EMBEDDING; NELDER-MEAD SIMPLEX; OPTIMAL RATE; PARAMETRIC MODELS; PRACTICAL METHOD; SPEED-UPS; STEGANOGRAPHIC ALGORITHMS; STEGANOGRAPHIC SCHEMES; SUPPORT VECTOR;

EID: 79954457569     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.872192     Document Type: Conference Paper
Times cited : (93)

References (30)
  • 1
    • 84955563192 scopus 로고    scopus 로고
    • Stretching the limits of steganography
    • R. J. Anderson, editor, Information Hiding, 1st International Workshop Cambridge, UK, May 30-June 1, Springer-Verlag, Berlin
    • R. Anderson. Stretching the limits of steganography. In R. J. Anderson, editor, Information Hiding, 1st International Workshop, volume 1174 of Lect. Notes in Computer Sc., pages 39-48, Cambridge, UK, May 30-June 1, 1996. Springer-Verlag, Berlin.
    • (1996) Lect. Notes in Computer Sc. , vol.1174 , pp. 39-48
    • Anderson, R.1
  • 2
    • 78649422691 scopus 로고    scopus 로고
    • July
    • P. Bas and T. Furon. BOWS-2. http://bows2.gipsa-lab.inpg.fr/BOWS2OrigEp3. tgz, July 2007.
    • (2007) BOWS-2
    • Bas, P.1    Furon, T.2
  • 4
    • 84957868624 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • D. Aucsmith, editor, Information Hiding, 2nd International Workshop, Portland, OR, April 14-17, Springer-Verlag, New York
    • C. Cachin. An information-theoretic model for steganography. In D. Aucsmith, editor, Information Hiding, 2nd International Workshop, volume 1525 of Lect. Notes in Computer Sc., pages 306-318, Portland, OR, April 14-17, 1998. Springer-Verlag, New York.
    • (1998) Lect. Notes in Computer Sc. , vol.1525 , pp. 306-318
    • Cachin, C.1
  • 6
    • 50949133669 scopus 로고    scopus 로고
    • LIBLINEAR: A library for large linear classification
    • Software available at
    • R.-E. Fan, K.-W. Chang, C.-J. Hsieh, X.-R. Wang, and C.-J. Lin. LIBLINEAR: A library for large linear classification. Journal of Machine Learning Research, (9):1871-1874, 2008. Software available at http://www.csie.ntu.edu.tw/~cjlin/liblinear.
    • (2008) Journal of Machine Learning Research , Issue.9 , pp. 1871-1874
    • Fan, R.-E.1    Chang, K.-W.2    Hsieh, C.-J.3    Wang, X.-R.4    Lin, C.-J.5
  • 8
    • 78149233355 scopus 로고    scopus 로고
    • Minimizing additive distortion in steganography using Syndrome-Trellis Codes
    • Submitted. See
    • T. Filler, J. Judas, and J. Fridrich. Minimizing additive distortion in steganography using Syndrome-Trellis Codes. IEEE Trans. on Information Forensics and Security, 2010. Submitted. See http://dde.binghamton.edu/filler/ publications.php.
    • (2010) IEEE Trans. on Information Forensics and Security
    • Filler, T.1    Judas, J.2    Fridrich, J.3
  • 11
    • 30744445178 scopus 로고    scopus 로고
    • Perturbed quantization steganography
    • DOI 10.1007/s00530-005-0194-3
    • J. Fridrich, M. Goljan, and D. Soukal. Perturbed quantization steganography. ACM Multimedia System Journal, 11(2):98-107, 2005. (Pubitemid 43099511)
    • (2005) Multimedia Systems , vol.11 , Issue.2 , pp. 98-107
    • Fridrich, J.1    Goljan, M.2    Soukal, D.3
  • 12
    • 38849102269 scopus 로고    scopus 로고
    • Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
    • Dallas, TX, September 20-21
    • J. Fridrich, T. Pevný, and J. Kodovský. Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In Proceedings of the 9th ACM Multimedia & Security Workshop, pages 3-14, Dallas, TX, September 20-21, 2007.
    • (2007) Proceedings of the 9th ACM Multimedia & Security Workshop , pp. 3-14
    • Fridrich, J.1    Pevný, T.2    Kodovský, J.3
  • 13
    • 4544371135 scopus 로고    scopus 로고
    • Dimensionality reduction for supervised learning with reproducing kernel hilbert spaces
    • K. Fukumizu, F. R. Bach, and M. I. Jordan. Dimensionality reduction for supervised learning with reproducing kernel hilbert spaces. Journal of Machine Learning Research, (5):73-99, 2004.
    • (2004) Journal of Machine Learning Research , Issue.5 , pp. 73-99
    • Fukumizu, K.1    Bach, F.R.2    Jordan, M.I.3
  • 17
    • 38049111044 scopus 로고    scopus 로고
    • Batch steganography and pooled steganalysis
    • Information Hiding, 8th International Workshop, Alexandria, VA, July 10-12
    • A. D. Ker. Batch steganography and pooled steganalysis. In Information Hiding, 8th International Workshop, volume 4437 of Lect. Notes in Computer Sc., pages 265-281, Alexandria, VA, July 10-12, 2006.
    • (2006) Lect. Notes in Computer Sc. , vol.4437 , pp. 265-281
    • Ker, A.D.1
  • 18
    • 38149033612 scopus 로고    scopus 로고
    • Modified matrix encoding technique for minimal distortion steganography
    • Information Hiding, 8th International Workshop, Alexandria, VA, July 10-12
    • Y. Kim, Z. Duric, and D. Richards. Modified matrix encoding technique for minimal distortion steganography. In Information Hiding, 8th International Workshop, volume 4437 of Lect. Notes in Computer Sc., pages 314-327, Alexandria, VA, July 10-12, 2006.
    • (2006) Lect. Notes in Computer Sc. , vol.4437 , pp. 314-327
    • Kim, Y.1    Duric, Z.2    Richards, D.3
  • 20
    • 70449646940 scopus 로고    scopus 로고
    • Calibration revisited
    • J. Dittmann, S. Craver, and J. Fridrich, editors, Princeton, NJ, September 7-8
    • J. Kodovský and J. Fridrich. Calibration revisited. In J. Dittmann, S. Craver, and J. Fridrich, editors, Proceedings of the 11th ACM Multimedia & Security Workshop, pages 63-74, Princeton, NJ, September 7-8, 2009.
    • (2009) Proceedings of the 11th ACM Multimedia & Security Workshop , pp. 63-74
    • Kodovský, J.1    Fridrich, J.2
  • 24
    • 78549231320 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • Information Hiding, 12th International Conference, Calgary, Alberta, Canada, June 28-30
    • T. Pevný, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In Information Hiding, 12th International Conference, Lect. Notes in Computer Sc., Calgary, Alberta, Canada, June 28-30 2010.
    • (2010) Lect. Notes in Computer Sc.
    • Pevný, T.1    Filler, T.2    Bas, P.3
  • 25
    • 56749152307 scopus 로고    scopus 로고
    • Benchmarking for steganography
    • K. Solanki, K. Sullivan, and U. Madhow, editors, Information Hiding, 10th International Workshop, Santa Barbara, CA, June 19-21, Springer-Verlag, New York
    • T. Pevný and J. Fridrich. Benchmarking for steganography. In K. Solanki, K. Sullivan, and U. Madhow, editors, Information Hiding, 10th International Workshop, volume 5284 of Lect. Notes in Computer Sc., pages 251-267, Santa Barbara, CA, June 19-21, 2008. Springer-Verlag, New York.
    • (2008) Lect. Notes in Computer Sc. , vol.5284 , pp. 251-267
    • Pevný, T.1    Fridrich, J.2
  • 26
    • 67749114807 scopus 로고    scopus 로고
    • Asymptotically optimal perfect steganographic systems
    • B.Y. Ryabko and D.B. Ryabko. Asymptotically optimal perfect steganographic systems. Problems of Information Transmission, 45(2):184-190, 2009.
    • (2009) Problems of Information Transmission , vol.45 , Issue.2 , pp. 184-190
    • Ryabko, B.Y.1    Ryabko, D.B.2
  • 27
    • 70449657749 scopus 로고    scopus 로고
    • Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
    • Princeton, NJ, Sept.
    • V. Sachnev, H. J. Kim, and R. Zhang. Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In Proceedings of the 11th ACM Multimedia & Security Workshop, pages 131-140, Princeton, NJ, Sept. 2009.
    • (2009) Proceedings of the 11th ACM Multimedia & Security Workshop , pp. 131-140
    • Sachnev, V.1    Kim, H.J.2    Zhang, R.3
  • 28
    • 35048819204 scopus 로고    scopus 로고
    • Model-based steganography
    • T. Kalker, I. J. Cox, and Y.Man Ro, editors, Digital Watermarking, 2nd International Workshop, Seoul, Korea, October 20-22, Springer-Verlag, New York
    • P. Sallee. Model-based steganography. In T. Kalker, I. J. Cox, and Y.Man Ro, editors, Digital Watermarking, 2nd International Workshop, volume 2939 of Lect. Notes in Computer Sc., pages 154-167, Seoul, Korea, October 20-22, 2003. Springer-Verlag, New York.
    • (2003) Lect. Notes in Computer Sc. , vol.2939 , pp. 154-167
    • Sallee, P.1
  • 30
    • 45249103920 scopus 로고    scopus 로고
    • Perfectly secure steganography: Capacity, error exponents, and code constructions
    • June
    • Y. Wang and P. Moulin. Perfectly secure steganography: Capacity, error exponents, and code constructions. IEEE Transactions on Information Theory, Special Issue on Security, 55(6):2706-2722, June 2008.
    • (2008) IEEE Transactions on Information Theory, Special Issue on Security , vol.55 , Issue.6 , pp. 2706-2722
    • Wang, Y.1    Moulin, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.